• fruitycoder@sh.itjust.works
    link
    fedilink
    arrow-up
    4
    ·
    5 hours ago

    Immutable, ephemerable, granularly permissioned, and encrypt EVERYTHING to enforce said permissions.

    1000x better than software signature hunting

    • rumba@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      6 minutes ago

      It’s all fun and games until some asshole slips something into your trusted package manager.

      Exploits are the deal pain

      • fruitycoder@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        1 hour ago

        Enforces confidentiality and integrity.

        Encryption on transports protects from man in the middle and sniffing. At rest protects evil maid exploits, which for these systems is more about preventing malicious software being swapped in place of trusted software.

        The same applies to encryption of links like pcie and memory with the time of transport and rest changing.

      • fruitycoder@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        1 hour ago

        Enforces confidentiality and integrity.

        Encryption on transports protects from man in the middle and sniffing. At rest protects evil maid exploits, which for these systems is more about preventing malicious software being swapped in place of trusted software.

        The same applies to encryption of links like pcie and memory with the time of transport and rest changing.